Chapter 11
What protocol is used for RADIUS? A) UDP B) NetBIOS C) TCP D) Proprietary
Correct Answer: A
IPsec provides which options as security services? A) ESP and AH B) ESP and AP C) EA and AP D) EA and AH
Correct Answer: A
On a VPN, traffic is encrypted and decrypted at: A) Endpoints of the tunnel only B) Users' machines C) Each device at each hop D) The data link layer of access devices
Correct Answer: A
Elements of Kerberos include which of the following? A) Tickets, ticket-granting server, ticket-authorizing agent B) Ticket-granting ticket, authentication server, ticket C) Services server, Kerberos realm, ticket authenticators D) Client-to-server ticket, authentication server ticket, ticket
Correct Answer: B
Passwords are an example of: A) Something you have B) Something you know C) A shared secret D) None of the above
Correct Answer: B
Which protocols are natively supported by Microsoft Windows XP and Vista for use in securing remote connections? A) SSH B) PPTP C) IPsec D) RADIUS
Correct Answer: B
IPsec can provide which of the following types of protection? A) Context protection B) Content protection C) Both context and content protection D) Neither context nor content protection
Correct Answer: C
Secure Shell uses which port to communicate? A) TCP port 80 B) UDP port 22 C) TCP port 22 D) TCP port 110
Correct Answer: C
A ticket-granting server is an important element in which of the following authentication models? A) L2TP B) RADIUS C) PPP D) Kerberos
Correct Answer: D
Authentication is typically based upon what? A) Something a user possesses B) Something a user knows C) Something measured on a user, such as a fingerprint D) All of the above
Correct Answer: D
To establish a PPTP connection across a firewall, you must do which of the following? A) Do nothing; PPTP does not need to cross firewalls by design. B) Do nothing; PPTP traffic is invisible and tunnels past firewalls. C) Open a UDP port of choice and assign it to PPTP. D) Open TCP port 1723.
Correct Answer: D
To establish an L2TP connection across a firewall, you must do which of the following? A) Do nothing; L2TP does not cross firewalls by design. B) Do nothing; L2TP tunnels past firewalls. C) Open a UDP port of choice and assign it to L2TP. D) Open UDP port 1701.
Correct Answer: D
What are the foundational elements of an access control system? A) Passwords, permissions, cryptography B) Shared secrets, authorization, authenticators C) Authentication, permissions, user IDs D) Identification, authorization, authentication
Correct Answer: D
Which of these protocols is used for carrying authentication, authorization, and accounting information between a network access server and a shared authentication server? A) IPsec B) VPN C) SSH D) RADIUS
Correct Answer: D
Which statement best describes differences between RADIUS and TACACS+? A) RADIUS is for Microsoft Windows only. B) TACACS+ is faster than RADIUS. C) RADIUS is a remote identification service. D) TACACS+ separates authentication, authorization, and accounting
Correct Answer: D